The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent
attackers to cause a denial of service (segmentation fault and crash) via a
long string to the join command, when using the -i switch, which triggers a
stack-based buffer overflow in the alloca function.
Author | Note |
---|---|
mdeslaur | Debian/Ubuntu don’t use the vulnerable patch |